{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:05:26Z","timestamp":1775837126195,"version":"3.50.1"},"reference-count":115,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T00:00:00Z","timestamp":1719446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministerio de Asuntos Econ\u00f3micos y Transformaci\u00f3n Digital","award":["TSI-063000-2021-58"],"award-info":[{"award-number":["TSI-063000-2021-58"]}]},{"name":"Ministerio de Asuntos Econ\u00f3micos y Transformaci\u00f3n Digital","award":["TSI-063000-2021-60"],"award-info":[{"award-number":["TSI-063000-2021-60"]}]},{"name":"Ministerio de Asuntos Econ\u00f3micos y Transformaci\u00f3n Digital","award":["TSI-063000-2021-61"],"award-info":[{"award-number":["TSI-063000-2021-61"]}]},{"name":"European Union-NextGenerationEU in the frameworks of the \u201cPlan de Recuperaci\u00f3n, Transformaci\u00f3n y Resiliencia\u201d and of the \u201cMecanismo de Recuperaci\u00f3n y Resiliencia\u201d through UNICO-5G I+D 6G-OPENSEC project","award":["TSI-063000-2021-58"],"award-info":[{"award-number":["TSI-063000-2021-58"]}]},{"name":"European Union-NextGenerationEU in the frameworks of the \u201cPlan de Recuperaci\u00f3n, Transformaci\u00f3n y Resiliencia\u201d and of the \u201cMecanismo de Recuperaci\u00f3n y Resiliencia\u201d through UNICO-5G I+D 6G-OPENSEC project","award":["TSI-063000-2021-60"],"award-info":[{"award-number":["TSI-063000-2021-60"]}]},{"name":"European Union-NextGenerationEU in the frameworks of the \u201cPlan de Recuperaci\u00f3n, Transformaci\u00f3n y Resiliencia\u201d and of the \u201cMecanismo de Recuperaci\u00f3n y Resiliencia\u201d through UNICO-5G I+D 6G-OPENSEC project","award":["TSI-063000-2021-61"],"award-info":[{"award-number":["TSI-063000-2021-61"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>The rapid development of 5G networks and the anticipation of 6G technologies have ushered in an era of highly customizable network environments facilitated by the innovative concept of network slicing. This technology allows the creation of multiple virtual networks on the same physical infrastructure, each optimized for specific service requirements. Despite its numerous benefits, network slicing introduces significant security vulnerabilities that must be addressed to prevent exploitation by increasingly sophisticated cyber threats. This review explores the application of cutting-edge technologies\u2014Artificial Intelligence (AI), specifically Machine Learning (ML), Software-Defined Networking (SDN), and Network Functions Virtualization (NFV)\u2014in crafting advanced security solutions tailored for network slicing. AI\u2019s predictive threat detection and automated response capabilities are analysed, highlighting its role in maintaining service integrity and resilience. Meanwhile, SDN and NFV are scrutinized for their ability to enforce flexible security policies and manage network functionalities dynamically, thereby enhancing the adaptability of security measures to meet evolving network demands. Thoroughly examining the current literature and industry practices, this paper identifies critical research gaps in security frameworks and proposes innovative solutions. We advocate for a holistic security strategy integrating ML, SDN, and NFV to enhance data confidentiality, integrity, and availability across network slices. The paper concludes with future research directions to develop robust, scalable, and efficient security frameworks capable of supporting the safe deployment of network slicing in next-generation networks.<\/jats:p>","DOI":"10.3390\/fi16070226","type":"journal-article","created":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T11:19:02Z","timestamp":1719487142000},"page":"226","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":44,"title":["Enhancing Network Slicing Security: Machine Learning, Software-Defined Networking, and Network Functions Virtualization-Driven Strategies"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8809-2218","authenticated-orcid":false,"given":"Jos\u00e9","family":"Cunha","sequence":"first","affiliation":[{"name":"Department of Engineering, School of Sciences and Technology, Universidade de Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"},{"name":"Optare Solutions, Parque Tecnol\u00f3gico de Vigo, 35315 Vigo, Spain"}]},{"given":"Pedro","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Department of Engineering, School of Sciences and Technology, Universidade de Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"},{"name":"Optare Solutions, Parque Tecnol\u00f3gico de Vigo, 35315 Vigo, Spain"}]},{"given":"Eva M.","family":"Castro","sequence":"additional","affiliation":[{"name":"Optare Solutions, Parque Tecnol\u00f3gico de Vigo, 35315 Vigo, Spain"},{"name":"Algoritmi Center, University of Minho, 4710-057 Braga, Portugal"},{"name":"Department of Information Systems, School of Engineering, University of Minho, Campus de Azur\u00e9m, 4800-058 Guimar\u00e3es, Portugal"}]},{"given":"Paula Cristina","family":"Oliveira","sequence":"additional","affiliation":[{"name":"Department of Engineering, School of Sciences and Technology, Universidade de Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"},{"name":"Centre for the Research and Technology of Agro-Environmental and Biological Sciences (CITAB), Universidade de Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6172-5855","authenticated-orcid":false,"given":"Maria Jo\u00e3o","family":"Nicolau","sequence":"additional","affiliation":[{"name":"Algoritmi Center, University of Minho, 4710-057 Braga, Portugal"},{"name":"Department of Information Systems, School of Engineering, University of Minho, Campus de Azur\u00e9m, 4800-058 Guimar\u00e3es, Portugal"}]},{"given":"Iv\u00e1n","family":"N\u00fa\u00f1ez","sequence":"additional","affiliation":[{"name":"Optare Solutions, Parque Tecnol\u00f3gico de Vigo, 35315 Vigo, Spain"}]},{"given":"Xos\u00e9 Ramon","family":"Sousa","sequence":"additional","affiliation":[{"name":"Optare Solutions, Parque Tecnol\u00f3gico de Vigo, 35315 Vigo, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4632-9664","authenticated-orcid":false,"given":"Carlos","family":"Ser\u00f4dio","sequence":"additional","affiliation":[{"name":"Department of Engineering, School of Sciences and Technology, Universidade de Tr\u00e1s-os-Montes e Alto Douro, 5000-801 Vila Real, Portugal"},{"name":"Algoritmi Center, University of Minho, 4710-057 Braga, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2024,6,27]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MCOM.001.2000230","article-title":"5G Deployment: Standalone vs. Non-Standalone from the Operator Perspective","volume":"58","author":"Liu","year":"2020","journal-title":"IEEE Commun. Mag."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"e12","DOI":"10.1017\/ATSIP.2015.2","article-title":"Wireless network technologies toward 5G","volume":"4","author":"Kimura","year":"2015","journal-title":"APSIPA Trans. Signal Inf. Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"67512","DOI":"10.1109\/ACCESS.2020.3031234","article-title":"A Survey on Beyond 5G Network With the Advent of 6G: Architecture and Emerging Technologies","volume":"9","author":"Dogra","year":"2021","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1109\/COMST.2023.3239220","article-title":"Understanding O-RAN: Architecture, Interfaces, Algorithms, Security, and Research Challenges","volume":"25","author":"Polese","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Chen, M., Yang, J., Hao, Y., Mao, S., and Hwang, K. (2017). A 5G Cognitive System for Healthcare. Big Data Cogn. Comput., 1.","DOI":"10.3390\/bdcc1010002"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Wu, Y.-J., Hwang, W.-S., Shen, C.-Y., and Chen, Y.-Y. (2022). Network Slicing for mMTC and URLLC Using Software-Defined Networking with P4 Switches. Electronics, 11.","DOI":"10.3390\/electronics11142111"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2017.1600935","article-title":"Network Slicing for 5G with SDN\/NFV: Concepts, Architectures, and Challenges","volume":"55","author":"Ameigeiras","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1109\/COMST.2019.2958784","article-title":"QoE management of multimedia streaming services in future networks: A tutorial and survey","volume":"22","author":"Barakabitze","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/OJCOMS.2022.3143098","article-title":"Towards 6G-Enabled Internet of Vehicles: Security and Privacy","volume":"3","author":"Ahmad","year":"2022","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/MWC.2019.1800234","article-title":"An Overview of Network Slicing for 5G","volume":"26","author":"Zhang","year":"2019","journal-title":"IEEE Wirel. Commun."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"160004","DOI":"10.1109\/ACCESS.2021.3130030","article-title":"6G Vision, Value, Use Cases and Technologies From European 6G Flagship Project Hexa-X","volume":"9","author":"Uusitalo","year":"2021","journal-title":"IEEE Access"},{"key":"ref_12","unstructured":"Bernardos, C.J., and Uusitalo, M.A. (2021). European Vision for the 6G Network Ecosystem, Zenodo."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1016\/j.comnet.2018.01.021","article-title":"A comprehensive survey of Network Function Virtualization","volume":"133","author":"Yi","year":"2018","journal-title":"Comput. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","article-title":"Software-Defined Networking: A Comprehensive Survey","volume":"103","author":"Kreutz","year":"2015","journal-title":"Proc. IEEE"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MCOM.2017.1600939","article-title":"The Algorithmic Aspects of Network Slicing","volume":"55","author":"Vassilaras","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/2559899.2560327","article-title":"The Road to SDN: An intellectual history of programmable networks","volume":"11","author":"Feamster","year":"2013","journal-title":"Queue"},{"key":"ref_17","unstructured":"(2020). ETSI Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV 2020, ETSI."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","article-title":"A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks","volume":"16","author":"Nunes","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s40860-022-00171-8","article-title":"A comprehensive survey on SDN security: Threats, mitigations, and future directions","volume":"9","author":"Maleh","year":"2023","journal-title":"J. Reliab. Intell. Environ."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"106984","DOI":"10.1016\/j.comnet.2019.106984","article-title":"5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges","volume":"167","author":"Barakabitze","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_21","first-page":"884","article-title":"Software Defined Networking (SDN) Challenges, issues and Solution","volume":"7","author":"Rana","year":"2019","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","article-title":"A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions","volume":"22","author":"Khan","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3682","DOI":"10.1109\/COMST.2019.2916180","article-title":"Security for 5G and Beyond","volume":"21","author":"Ahmad","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1761","DOI":"10.1109\/COMST.2020.2997475","article-title":"Complementing IoT Services Through Software Defined Networking and Edge Computing: A Comprehensive Survey","volume":"22","author":"Rafique","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1102","DOI":"10.1109\/COMST.2015.2402617","article-title":"Programmable Networks\u2014From Software-Defined Radio to Software-Defined Networking","volume":"17","author":"Macedo","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_26","first-page":"11","article-title":"SDN Interfaces: Protocols, Taxonomy and Challenges","volume":"12","author":"Ahmad","year":"2022","journal-title":"Int. J. Wirel. Microw. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Singh, P.K., Brahma, M., Nath, P., and Ghosh, U. (2023, January 1\u20134). A Study on Secure Network Slicing in 5G. Proceedings of the 2023 IEEE\/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), Bangalore, India.","DOI":"10.1109\/CCGridW59191.2023.00023"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Al-Alaj, A., Sandhu, R., and Krishnan, R. (2019, January 27). A Formal Access Control Model for SE-Floodlight Controller. Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, Richardson, TX, USA.","DOI":"10.1145\/3309194.3309195"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Porras, P., Cheung, S., Fong, M., Skinner, K., and Yegneswaran, V. (2015, January 8\u201311). Securing the Software Defined Network Control Layer. Proceedings of the 2015 Network and Distributed System Security Symposium, San Diego, CA, USA.","DOI":"10.14722\/ndss.2015.23222"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"102595","DOI":"10.1016\/j.jnca.2020.102595","article-title":"Security in SDN: A comprehensive survey","volume":"159","author":"Imbachi","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_31","unstructured":"Chiosi, M., Clarke, D., Willis, P., Reid, A., Feger, J., Bugenhagen, M., Khan, W., Fargano, M., Cui, C., and Deng, H. (2024, May 06). Network Functions Virtualisation: An Introduction, Benefits, Enablers, Challenges & Call for Action. Available online: https:\/\/portal.etsi.org\/NFV\/NFV_White_Paper.pdf."},{"key":"ref_32","unstructured":"European Union Agency for Cybersecurity (2022). NFV Security in 5G: Challenges and Best Practices, Publications Office."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Yang, W., and Fung, C. (2016, January 6\u201310). A survey on security in network functions virtualization. Proceedings of the 2016 IEEE NetSoft Conference and Workshops (NetSoft), Seoul, Republic of Korea.","DOI":"10.1109\/NETSOFT.2016.7502434"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1109\/MCOM.2015.7045396","article-title":"Network function virtualization: Challenges and opportunities for innovations","volume":"53","author":"Han","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOM.2016.7452271","article-title":"Network function virtualization in 5G","volume":"54","author":"Abdelwahab","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Alnaim, A.K., Alwakeel, A.M., and Fernandez, E.B. (2022). Towards a Security Reference Architecture for NFV. Sensors, 22.","DOI":"10.3390\/s22103750"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1109\/TCC.2021.3116183","article-title":"Strong Temporal Isolation Among Containers in OpenStack for NFV Services","volume":"11","author":"Cucinotta","year":"2023","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Pattaranantakul, M., He, R., Meddahi, A., and Zhang, Z. (2016, January 23\u201326). SecMANO: Towards Network Functions Virtualization (NFV) Based Security MANagement and Orchestration. Proceedings of the 2016 IEEE Trustcom\/BigDataSE\/ISPA, Tianjin, China.","DOI":"10.1109\/TrustCom.2016.0115"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Abdulqadder, I.H., Zhou, S., Zou, D., Aziz, I.T., and Akber, S.M.A. (2020, January 28\u201331). Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G\/B5G Enabled SDN\/NFV Cloud of IoT. Proceedings of the 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China.","DOI":"10.1109\/ICCT50939.2020.9295823"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"De Benedictis, M., and Lioy, A. (2017, January 6\u20138). On the establishment of trust in the cloud-based ETSI NFV framework. Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Berlin, Germany.","DOI":"10.1109\/NFV-SDN.2017.8169864"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2429","DOI":"10.1109\/COMST.2018.2815638","article-title":"Network Slicing and Softwarization: A Survey on Principles, Enabling Technologies, and Solutions","volume":"20","author":"Afolabi","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1109\/OJCOMS.2020.3010270","article-title":"6G Wireless Communication Systems: Applications, Requirements, Technologies, Challenges, and Research Directions","volume":"1","author":"Chowdhury","year":"2020","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Dang, X.-T., and Sivrikaya, F. (2020, January 24\u201327). A Lightweight Policy-aware Broker for Multi-domain Network Slice Composition. Proceedings of the 2020 23rd Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France.","DOI":"10.1109\/ICIN48450.2020.9059366"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Li, X., He, M., and Ni, J. (2023, January 10\u201312). Secure and Privacy-preserving Network Slicing in 3GPP 5G System Architecture. Proceedings of the 2023 IEEE\/CIC International Conference on Communications in China (ICCC), Dalian, China.","DOI":"10.1109\/ICCC57788.2023.10233451"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"25502","DOI":"10.1109\/ACCESS.2023.3255510","article-title":"The Role of Network Slicing and Edge Computing in the Metaverse Realization","volume":"11","author":"Karunarathna","year":"2023","journal-title":"IEEE Access"},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Li, Y., Zhang, J., Xue, H., Ma, J., Wu, J., Zhao, M., Han, C., and Dang, X. (2022). 5G Core Network Slices Embedding and Deploying Based on Greedy Algorithm in Smart Grids, IEEE.","DOI":"10.1109\/ICAIT56197.2022.9862607"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"349","DOI":"10.23919\/JCIN.2022.10005213","article-title":"Blockchain for Network Slicing in 5G and Beyond: Survey and Challenges","volume":"7","author":"Bao","year":"2022","journal-title":"J. Commun. Inf. Netw."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Dangi, R., Jadhav, A., Choudhary, G., Dragoni, N., Mishra, M.K., and Lalwani, P. (2022). ML-Based 5G Network Slicing Security: A Comprehensive Survey. Future Internet, 14.","DOI":"10.3390\/fi14040116"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"36009","DOI":"10.1109\/ACCESS.2020.2975072","article-title":"Network Slicing: Recent Advances, Taxonomy, Requirements, and Open Research Challenges","volume":"8","author":"Khan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Dalgitsis, M., Cadenelli, N., Serrano, M.A., Bartzoudis, N., Alonso, L., and Antonopoulos, A. (2023, January 7\u20139). NSFaaS: Network Slice Federation as a Service in Cloud-Native 5G and Beyond Mobile Networks. Proceedings of the 2023 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Dresden, Germany.","DOI":"10.1109\/NFV-SDN59219.2023.10329748"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MWC.001.2100338","article-title":"AI-Native Network Slicing for 6G Networks","volume":"29","author":"Wu","year":"2022","journal-title":"IEEE Wirel. Commun."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1109\/COMST.2023.3312349","article-title":"A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions","volume":"26","author":"Porambage","year":"2024","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/DISCEX.2001.932156","article-title":"Automatic management of network security policy","volume":"Volume 2","author":"Burns","year":"2001","journal-title":"Proceedings of the Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX\u201901"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1016\/S0166-4972(03)00092-0","article-title":"Self-organizing innovation networks: Implications for globalization","volume":"24","author":"Rycroft","year":"2004","journal-title":"Technovation"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/353323.353382","article-title":"Enforceable security policies","volume":"3","author":"Schneider","year":"2000","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Scheid, E.J., Machado, C.C., Franco, M.F., Dos Santos, R.L., Pfitscher, R.P., Schaeffer-Filho, A.E., and Granville, L.Z. (2017, January 8\u201312). INSpIRE: Integrated NFV-based Intent Refinement Environment. Proceedings of the 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, Portugal.","DOI":"10.23919\/INM.2017.7987279"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MNET.2002.993217","article-title":"Guest editorial\u2014Policy-based networking","volume":"16","author":"Chadha","year":"2002","journal-title":"IEEE Netw."},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Foster, N., Freedman, M.J., Harrison, R., Rexford, J., Meola, M.L., and Walker, D. (2010, January 30). Frenetic: A high-level language for OpenFlow networks. Proceedings of the Workshop on Programmable Routers for Extensible Services of Tomorrow, Philadelphia, PA, USA.","DOI":"10.1145\/1921151.1921160"},{"key":"ref_59","first-page":"163","article-title":"PonderFlow: A New Policy Specification Language to SDN OpenFlow-based Networks","volume":"7","author":"Batista","year":"2014","journal-title":"Int. J. Adv. Netw. Serv."},{"key":"ref_60","unstructured":"Damianou, N., Dulay, N., Lupu, E., and Sloman, M. (2000). Ponder: A Language for Specifying Security and Management Policies for Distributed Systems, Imperial College London."},{"key":"ref_61","unstructured":"Amoroso, A. (2020). Automated Policy Enforcement in Software Defined Networking and Network Function Virtualization Environment. [Master\u2019s Thesis, Politecnico di Torino]."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Giotis, K., Kryftis, Y., and Maglaris, V. (2015, January 13\u201317). Policy-based orchestration of NFV services in Software-Defined Networks. Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft), London, UK.","DOI":"10.1109\/NETSOFT.2015.7116145"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Abbas, K., Afaq, M., Khan, T.A., Mehmood, A., and Song, W.-C. (2020, January 23\u201325). IBNSlicing: Intent-Based Network Slicing Framework for 5G Networks using Deep Learning. Proceedings of the 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS), Daegu, Republic of Korea.","DOI":"10.23919\/APNOMS50412.2020.9237008"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"69144","DOI":"10.1109\/ACCESS.2023.3292788","article-title":"Enhancing Network Slicing Architectures With Machine Learning, Security, Sustainability and Experimental Networks Integration","volume":"11","author":"Martins","year":"2023","journal-title":"IEEE Access"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1007\/s12243-022-00938-3","article-title":"5G, 6G, and Beyond: Recent advances and future challenges","volume":"78","author":"Salahdine","year":"2023","journal-title":"Ann. Telecommun. Telecommun."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"836","DOI":"10.3390\/telecom4040037","article-title":"6G Mobile Networks: Key Technologies, Directions, and Advances","volume":"4","author":"Dangi","year":"2023","journal-title":"Telecom"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1007\/s11277-023-10821-6","article-title":"5G Security Threat Landscape, AI and Blockchain","volume":"133","author":"Alanazi","year":"2023","journal-title":"Wirel. Pers. Commun."},{"key":"ref_68","unstructured":"Kaloxylos, A., Gavras, A., Camps Mur, D., Ghoraishi, M., and Hrasnica, H. (2020). AI and ML\u2014Enablers for Beyond 5G Networks, 5G PPP."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Fakhouri, H.N., Alawadi, S., Awaysheh, F.M., Hani, I.B., Alkhalaileh, M., and Hamad, F. (2023). A Comprehensive Study on the Role of Machine Learning in 5G Security: Challenges, Technologies, and Solutions. Electronics, 12.","DOI":"10.3390\/electronics12224604"},{"key":"ref_70","first-page":"30","article-title":"Enhancing Cybersecurity with Artificial Intelligence: Predictive Techniques and Challenges in the Age of IoT","volume":"13","author":"Meduri","year":"2024","journal-title":"Int. J. Sci. Eng. Appl."},{"key":"ref_71","unstructured":"Haider, N., Baig, M.Z., and Imran, M. (2020). Artificial Intelligence and Machine Learning in 5G Network Security: Opportunities, advantages, and future research trends 2020. arXiv."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"102667","DOI":"10.1016\/j.adhoc.2021.102667","article-title":"Machine learning for 5G security: Architecture, recent advances, and challenges","volume":"123","author":"Afaq","year":"2021","journal-title":"Ad Hoc Netw."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"190822","DOI":"10.1109\/ACCESS.2020.3031966","article-title":"Machine Learning Threatens 5G Security","volume":"8","author":"Suomalainen","year":"2020","journal-title":"IEEE Access"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Siriwardhana, Y., Porambage, P., Liyanage, M., and Ylianttila, M. (2021, January 8\u201311). AI and 6G Security: Opportunities and Challenges. Proceedings of the 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC\/6G Summit), Porto, Portugal.","DOI":"10.1109\/EuCNC\/6GSummit51104.2021.9482503"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"12235","DOI":"10.1109\/TVT.2022.3193074","article-title":"Distributed Online Anomaly Detection for Virtualized Network Slicing Environment","volume":"71","author":"Wang","year":"2022","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_76","first-page":"331","article-title":"Security as a solution: An intrusion detection system using a neural network for IoT enabled healthcare ecosystem","volume":"16","author":"Jain","year":"2021","journal-title":"Interdiscip. J. Inf. Knowl. Manag."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Sattar, D., and Matrawy, A. (2019, January 10\u201312). Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices. Proceedings of the 2019 IEEE Conference on Communications and Network Security (CNS), Washington, DC, USA.","DOI":"10.1109\/CNS.2019.8802852"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Tonini, F., Natalino, C., Furdek, M., Raffaelli, C., and Monti, P. (2020, January 18\u201321). Network Slicing Automation: Challenges and Benefits. Proceedings of the 2020 International Conference on Optical Network Design and Modeling (ONDM), Barcelona, Spain.","DOI":"10.23919\/ONDM48393.2020.9133004"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"23472","DOI":"10.1109\/ACCESS.2021.3051557","article-title":"Machine Learning Techniques for 5G and Beyond","volume":"9","author":"Kaur","year":"2021","journal-title":"IEEE Access"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s13042-020-01178-4","article-title":"A survey of 5G network systems: Challenges and machine learning approaches","volume":"12","author":"Fourati","year":"2021","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Asghar, M.Z., Abbas, M., Zeeshan, K., Kotilainen, P., and H\u00e4m\u00e4l\u00e4inen, T. (2019). Assessment of Deep Learning Methodology for Self-Organizing 5G Networks. Appl. Sci., 9.","DOI":"10.3390\/app9152975"},{"key":"ref_82","first-page":"381","article-title":"Machine Learning Algorithms\u2014A Review","volume":"9","author":"Mahesh","year":"2020","journal-title":"Int. J. Sci. Res. IJSR"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"137184","DOI":"10.1109\/ACCESS.2019.2942390","article-title":"Machine Learning for 5G\/B5G Mobile and Wireless Communications: Potential, Limitations, and Future Directions","volume":"7","author":"Lee","year":"2019","journal-title":"IEEE Access"},{"key":"ref_84","first-page":"72","article-title":"Unsupervised Learning","volume":"Volume 3176","author":"Bousquet","year":"2004","journal-title":"Advanced Lectures on Machine Learning"},{"key":"ref_85","first-page":"278","article-title":"A Comprehensive Study of Artificial Neural Networks","volume":"2","author":"Sharma","year":"2012","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1109\/OJCOMS.2021.3058353","article-title":"A Review of Deep Learning in 5G Research: Channel Coding, Massive MIMO, Multiple Access, Resource Allocation, and Network Security","volume":"2","author":"Ly","year":"2021","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Doan, M., and Zhang, Z. (2020, January 1\u20132). Deep Learning in 5G Wireless Networks\u2014Anomaly Detections. Proceedings of the 2020 29th Wireless and Optical Communications Conference (WOCC), Newark, NJ, USA.","DOI":"10.1109\/WOCC48579.2020.9114924"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"102002","DOI":"10.1016\/j.phycom.2023.102002","article-title":"Deep learning based physical layer security for terrestrial communications in 5G and beyond networks: A survey","volume":"57","author":"Sharma","year":"2023","journal-title":"Phys. Commun."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Thantharate, A., Paropkari, R., Walunj, V., Beard, C., and Kankariya, P. (2020, January 6\u20138). Secure5G: A Deep Learning Framework Towards a Secure Network Slicing in 5G and Beyond. Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC47524.2020.9031158"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Thantharate, A., Paropkari, R., Walunj, V., and Beard, C. (2019, January 10\u201312). DeepSlice: A Deep Learning Approach towards an Efficient and Reliable Network Slicing in 5G Networks. Proceedings of the 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA.","DOI":"10.1109\/UEMCON47517.2019.8993066"},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1109\/LWC.2021.3133479","article-title":"DeepSecure: Detection of Distributed Denial of Service Attacks on 5G Network Slicing\u2014Deep Learning Approach","volume":"11","author":"Kuadey","year":"2022","journal-title":"IEEE Wirel. Commun. Lett."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Hakak, S., and Ghorbani, A.A. (2019, January 1\u20133). Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India.","DOI":"10.1109\/CCST.2019.8888419"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Jiang, W., Anton, S.D., and Dieter Schotten, H. (2019, January 11\u201313). Intelligence Slicing: A Unified Framework to Integrate Artificial Intelligence into 5G Networks. Proceedings of the 2019 12th IFIP Wireless and Mobile Networking Conference (WMNC), Paris, France.","DOI":"10.23919\/WMNC.2019.8881402"},{"key":"ref_94","unstructured":"Lemay, A. (2016, January 8). Fernandez Providing SCADA network data sets for intrusion detection research. Proceedings of the 9th USENIX Conference on Cyber Security Experimentation and Test, Austin, TX, USA."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MNET.011.1900303","article-title":"Learning-Assisted Secure End-to-End Network Slicing for Cyber-Physical Systems","volume":"34","author":"Liu","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1002\/spe.2800","article-title":"A real-time attack defense framework for 5G network slicing","volume":"50","author":"Bonfim","year":"2020","journal-title":"Softw. Pract. Exp."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.cose.2014.05.011","article-title":"An empirical comparison of botnet detection methods","volume":"45","author":"Grill","year":"2014","journal-title":"Comput. Secur."},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Bousalem, B., Silva, V.F., Langar, R., and Cherrier, S. (2022, January 4\u20138). DDoS Attacks Detection and Mitigation in 5G and Beyond Networks: A Deep Learning-based Approach. Proceedings of the GLOBECOM 2022\u20142022 IEEE Global Communications Conference, Rio de Janeiro, Brazil.","DOI":"10.1109\/GLOBECOM48099.2022.10001562"},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1109\/TNSM.2020.2971776","article-title":"Lucid: A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection","volume":"17","author":"Millar","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/COMST.2015.2463811","article-title":"A Survey of Policy Refinement Methods as a Support for Sustainable Networks","volume":"18","author":"Riekstin","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/TNSM.2016.2517407","article-title":"OpenSec: Policy-Based Security Using Software-Defined Networking","volume":"13","author":"Lara","year":"2016","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MNET.2003.1201473","article-title":"A policy-based management architecture for active and programmable networks","volume":"17","author":"Tsorouchis","year":"2003","journal-title":"IEEE Netw."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1109\/TNSM.2021.3128882","article-title":"Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures","volume":"19","author":"Varadharajan","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1186\/1869-0238-4-6","article-title":"PolyViNE: Policy-based virtual network embedding across multiple domains","volume":"4","author":"Samuel","year":"2013","journal-title":"J. Internet Serv. Appl."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Lee, W., and Kim, N. (2017). Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking. Information, 8.","DOI":"10.3390\/info8020065"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1109\/COMST.2022.3215919","article-title":"A Survey on Intent-Based Networking","volume":"25","author":"Leivadeas","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1145\/3538513","article-title":"Intent-based networking for the enterprise: A modern network architecture","volume":"65","author":"Falkner","year":"2022","journal-title":"Commun. ACM"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.dcan.2020.07.001","article-title":"Intent-based networks for 6G: Insights and challenges","volume":"6","author":"Wei","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1109\/TNET.2019.2895278","article-title":"Adding Support for Automatic Enforcement of Security Policies in NFV Networks","volume":"27","author":"Basile","year":"2019","journal-title":"IEEEACM Trans. Netw."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Molina Zarca, A., Bagaa, M., Bernal Bernabe, J., Taleb, T., and Skarmeta, A.F. (2020). Semantic-Aware Security Orchestration in SDN\/NFV-Enabled IoT Systems. Sensors, 20.","DOI":"10.3390\/s20133622"},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"109123","DOI":"10.1016\/j.comnet.2022.109123","article-title":"Automatic, verifiable and optimized policy-based security enforcement for SDN-aware IoT networks","volume":"213","author":"Bringhenti","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Sousa, N.F.S.D., and Rothenberg, C.E. (2021, January 9\u201311). CLARA: Closed Loop-based Zero-touch Network Management Framework. Proceedings of the 2021 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Heraklion, Greece.","DOI":"10.1109\/NFV-SDN53031.2021.9665048"},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Tam, P., Ros, S., Song, I., and Kim, S. (2024). QoS-Driven Slicing Management for Vehicular Communications. Electronics, 13.","DOI":"10.3390\/electronics13020314"},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/MNET.011.1900458","article-title":"Reliability for Smart Healthcare: A Network Slicing Perspective","volume":"34","author":"Vergutz","year":"2020","journal-title":"IEEE Netw."},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/MNET.2019.1800083","article-title":"Edge Computing for Smart Health: Context-Aware Approaches, Opportunities, and Challenges","volume":"33","author":"Abdellatif","year":"2019","journal-title":"IEEE Netw."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/7\/226\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:06:24Z","timestamp":1760108784000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/7\/226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,27]]},"references-count":115,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2024,7]]}},"alternative-id":["fi16070226"],"URL":"https:\/\/doi.org\/10.3390\/fi16070226","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,27]]}}}